Author of the publication

Editorial for special issue on security and trust on networked systems.

, , , and . Int. J. Netw. Manag., (May 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Research on Identity Authentication Scheme of Internet of Things Equipment in 5G Network Environment., , , , and . ICCT, page 312-316. IEEE, (2019)Anonymous End to End Encryption Group Messaging Protocol Based on Asynchronous Ratchet Tree., and . ICICS, volume 12282 of Lecture Notes in Computer Science, page 588-605. Springer, (2020)A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256., , , and . ICISC, volume 8949 of Lecture Notes in Computer Science, page 271-285. Springer, (2014)An Outsourced Multi-authority Attribute-Based Encryption for Privacy Protection with Dynamicity and Audit., and . BlockTEA, volume 498 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 69-88. Springer, (2022)A Privacy-Preserving and Auditable Scheme for Interfacing Public Blockchain with Consortium Blockchain., and . BlockTEA, volume 498 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 89-105. Springer, (2022)Security, Privacy, and Trust on Internet of Things., , , and . Wirel. Commun. Mob. Comput., (2019)Chatting Application Monitoring on Android System and its Detection based on the Correlation Test., , and . APSIPA, page 1556-1563. IEEE, (2018)Weight Matters: An Empirical Investigation of Distance Oracles on Knowledge Graphs., , , and . CIKM, page 4440-4444. ACM, (2023)Cryptanalysis of Raindrop and FBC., , , , , and . NSS, volume 11928 of Lecture Notes in Computer Science, page 536-551. Springer, (2019)Practical and Provable Secure Vehicular Component Protection Scheme., and . EISA, volume 1403 of Communications in Computer and Information Science, page 1-20. Springer, (2021)